Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5609-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5609-1 - Several vulnerabilities were discovered in the Slurm Workload Manager, a cluster resource management and job scheduling system, which may result in privilege escalation, denial of service, bypass of message hash checks or opening files with an incorrect set of extended groups.
- systems | linux[9], debian[10]
- advisories | CVE-2023-49933[11], CVE-2023-49936[12], CVE-2023-49937[13], CVE-2023-49938[14]
- SHA-256 |
f57d906dddf94852997ecaf61e4354f8e39782336cb81672d34166c0cb2789b8
- Download[15] | Favorite[16] | View[17]
Change Mirror[18] Download[19]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5609-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Salvatore Bonaccorso
January 28, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : slurm-wlm
CVE ID : CVE-2023-49933 CVE-2023-49936 CVE-2023-49937 CVE-2023-49938
Debian Bug : 1058720
Several vulnerabilities were discovered in the Slurm Workload Manager, a
cluster resource management and job scheduling system, which may result
in privilege escalation, denial of service, bypass of message hash
checks or opening files with an incorrect set of extended groups.
For the stable distribution (bookworm), these problems have been fixed
in version 22.05.8-4+deb12u2.
We recommend that you upgrade your slurm-wlm packages.
For the detailed security status of slurm-wlm please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/slurm-wlm
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----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=fdxl
-----END PGP SIGNATURE-----
File Tags
- ActiveX[25] (932)
- Advisory[26] (83,946)
- Arbitrary[27] (16,508)
- BBS[28] (2,859)
- Bypass[29] (1,810)
- CGI[30] (1,031)
- Code Execution[31] (7,521)
- Conference[32] (685)
- Cracker[33] (843)
- CSRF[34] (3,365)
- DoS[35] (24,223)
- Encryption[36] (2,377)
- Exploit[37] (52,460)
- File Inclusion[38] (4,241)
- File Upload[39] (982)
- Firewall[40] (822)
- Info Disclosure[41] (2,819)
- Intrusion Detection[42] (902)
- Java[43] (3,111)
- JavaScript[44] (884)
- Kernel[45] (6,899)
- Local[46] (14,626)
- Magazine[47] (586)
- Overflow[48] (12,942)
- Perl[49] (1,429)
- PHP[50] (5,167)
- Proof of Concept[51] (2,359)
- Protocol[52] (3,677)
- Python[53] (1,585)
- Remote[54] (31,191)
- Root[55] (3,610)
- Rootkit[56] (517)
- Ruby[57] (615)
- Scanner[58] (1,646)
- Security Tool[59] (7,948)
- Shell[60] (3,224)
- Shellcode[61] (1,216)
- Sniffer[62] (898)
- Spoof[63] (2,236)
- SQL Injection[64] (16,468)
- TCP[65] (2,420)
- Trojan[66] (687)
- UDP[67] (896)
- Virus[68] (667)
- Vulnerability[69] (32,325)
- Web[70] (9,813)
- Whitepaper[71] (3,763)
- x86[72] (966)
- XSS[73] (18,088)
- Other[74]
File Archives
- January 2024[75]
- December 2023[76]
- November 2023[77]
- October 2023[78]
- September 2023[79]
- August 2023[80]
- July 2023[81]
- June 2023[82]
- May 2023[83]
- April 2023[84]
- March 2023[85]
- February 2023[86]
- Older[87]
Systems
- AIX[88] (429)
- Apple[89] (2,058)
- BSD[90] (375)
- CentOS[91] (57)
- Cisco[92] (1,926)
- Debian[93] (6,953)
- Fedora[94] (1,693)
- FreeBSD[95] (1,246)
- Gentoo[96] (4,425)
- HPUX[97] (880)
- iOS[98] (369)
- iPhone[99] (108)
- IRIX[100] (220)
- Juniper[101] (69)
- Linux[102] (48,371)
- Mac OS X[103] (691)
- Mandriva[104] (3,105)
- NetBSD[105] (256)
- OpenBSD[106] (487)
- RedHat[107] (14,947)
- Slackware[108] (941)
- Solaris[109] (1,611)
- SUSE[110] (1,444)
- Ubuntu[111] (9,245)
- UNIX[112] (9,356)
- UnixWare[113] (187)
- Windows[114] (6,620)
- Other[115]
- Services
- Security Services[126]
- Hosting By
- Rokasec[127]
![close](https://packetstatic.com/img1514015884/o_close.png)
Read more https://packetstormsecurity.com/files/176845/dsa-5609-1.txt